Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe
Resource
win10v2004-20231215-en
General
-
Target
acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe
-
Size
10.3MB
-
MD5
3694d46734b4203df329094375dacf60
-
SHA1
0df75295e96404a9a0ec681c8a3f72da1119e96f
-
SHA256
acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf
-
SHA512
077e34ef954c54141f9c552006b723faf3df1a2b54da3bf4d3f3c90d8ebe5eea36ed1020779cdf3541626d0c97b4ec1fdbc1b0870869de249b8ab841bf19691b
-
SSDEEP
196608:EXCG18XYqsBmiFm4CTqfG+vTiwnDmNQkJM8uDIYnKO37Z:2CG8XD4F3e+biSDcQwM8uDu6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2748 aria2c.exe -
Loads dropped DLL 2 IoCs
pid Process 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2748 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 30 PID 2256 wrote to memory of 2748 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 30 PID 2256 wrote to memory of 2748 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 30 PID 2256 wrote to memory of 2748 2256 acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe"C:\Users\Admin\AppData\Local\Temp\acde86340b9377351d2232a6c3ccbf76a8b7d6e738af5bdec805aa3839755eaf.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\datatemp\aria2c.exe"C:\Users\Admin\AppData\Roaming\datatemp\aria2c.exe" --conf-path=C:\Users\Admin\AppData\Roaming\datatemp\aria2.conf #--save-session=C:\Users\Admin\AppData\Roaming\datatemp\aria2.session --input-file=C:\Users\Admin\AppData\Roaming\datatemp\aria2.session --rpc-listen-port=7022 --listen-port=7055 --dht-listen-port=7033 --enable-rpc=true --rpc-allow-origin-all=true --disable-ipv6=false --rpc-secret=123 --enable-dht=true --enable-dht6=true --dht-file-path=C:/Users/Admin/AppData/Roaming/datatemp/dht.dat --dht-file-path6=C:/Users/Admin/AppData/Roaming/datatemp/dht6.dat --bt-external-ip= --stop-with-process=22562⤵
- Executes dropped EXE
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD58fe8b7178aba312ef6db32fac969b70c
SHA11fa1abee48b1a02fcd8451d82e4b9b606cbfd339
SHA2569f54938d4bd3febce3a6286c9281dc68a399e5babce42742e09343b12ad31c98
SHA5125d09499070e5483548b142d226303933fafa310ea3ddd0b1ca582b760528dc846fa0f73bdfb8fb7166c41715377ed110dee3c4c91d3252d0f7a6de5be721aa2e
-
Filesize
73KB
MD5ac00e670767bed0f484fcd62d1a15dba
SHA18c8fe2782f35e1267d64bc0c348983ff5bae0aaf
SHA256240c3d7ee1181f3d10999cff2b541450324f614a82fb94c4923292d82dcfc861
SHA5126253e24c60331ff8f0e5b0496b9bb0bba69fad7e86c92055676164f0776b226f473ef54ee22601fa11da622b090d4a782de24b60ffeb43dab7e6cd0248a952d2
-
Filesize
128KB
MD598d854fda7295044cec31e0bd2e491cd
SHA115c3c32fa69792bb09007cca210a62746ea9d832
SHA25661e6413612a873cc4baee4cf6a9a3ec125c696f86a00f1af52f8c65746464344
SHA5129c749100684b03648605fade3e92f116dbed62de1141a41231847a88be3db267e1e3e2c7d35abe144de3c8151b1522c13e4bb2d06cba697e693b0e004887e9bb
-
Filesize
44KB
MD55f386c1b9892814a8ad7fa46ab420603
SHA15b1d220034185f263dae6edfb97ab1847662bbc2
SHA256ae46a02661ee141c93fcd6039c82442b7a7516c8203edb56182e0ebac82aa83e
SHA512b1acce6c6b2c82d293e815466e3c617544b3a57e9b7c4301f02d9eaff2fc1c7aa3302356f17d4dcfba902a11b4d04d8ec8105f1940d963c73219f7f37c37f490